LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-08-2009, 05:57 PM   #1
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Rep: Reputation: 15
Thumbs up In what occasion will Honeycomb generate snort signatures ?


Hi guys,
I've just finished setting up honeyd and honeycomb under debian for my 1st time. What I want to ask is what occasion that makes honeycomb generate snort signature ? or just to make it more simple , what should I do to test my honeycomb plugin ?

Thank you very much
 
Old 05-09-2009, 07:24 AM   #2
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by summersgone View Post
Hi guys,
I've just finished setting up honeyd and honeycomb under debian for my 1st time. What I want to ask is what occasion that makes honeycomb generate snort signature ? or just to make it more simple , what should I do to test my honeycomb plugin ?

Thank you very much
I've no experience with honeypots or honeynets but if you've set up a honeyPOT on one particular exposed system, it is more than likely set up as host-based. Snort is network-based. It is quite possible that Snort will not alert on a host-based attack. We see this at work all the time. Also, host-based detection is much less 'noisy' than network based.

I'd be relying more on the logs that show on the honeypot if I were looking for some type of host-based attack.
 
Old 05-09-2009, 10:40 AM   #3
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Original Poster
Rep: Reputation: 15
Thank you for your answer , unixfool
But I'm still looking for how do I generate snort signature by using honeycomb ?

THank you
 
Old 05-09-2009, 01:02 PM   #4
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by summersgone View Post
Thank you for your answer , unixfool
But I'm still looking for how do I generate snort signature by using honeycomb ?

THank you
I see that Honeycomb is supposed to automatically create sigs:

Here --> http://nms.lcs.mit.edu/HotNets-II/papers/honeycomb.pdf

Here --> http://www.icir.org/christian/honeycomb/

I got that from Google, btw:

http://www.google.com/search?q=snort+honeycomb

Last edited by unixfool; 05-09-2009 at 01:32 PM.
 
Old 05-10-2009, 05:31 PM   #5
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Original Poster
Rep: Reputation: 15
Thank you for the answer, unixfool
Apparently I've read all those links .. and I found nothing details about how do i generate snort signature from honeycomb . Does anyone else ever had experience in using honeycomb ?

Thank you
 
Old 05-12-2009, 10:53 AM   #6
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Bad traffic has to happen to be logged. If you're not seeing anything, either your setup isn't working correctly, your placement of your honeypot isn't optimal or something is filtering upstream traffic of bad qualities, before it gets to the honeypot.

Based on the reading I've done (those links I provided you), Honeycomb will autogenerate Snort sigs, but that's all it will do. You will have to either totally expose the honeypot to bad traffic or use something like milw0rm to run exploits against the honeypot, which would get Honeycomb to create a sig.

How do you have things set up? Where is your honeypot set up in relation to the rest of your network? What traffic has it seen so far and is there some indication that Honeycomb isn't working?

I know you're looking for someone else to answer, but no one else has yet to chime in. One issue that I noticed is that your posts aren't clear in what assistance you need. It also isn't clear what you've currently done to troubleshoot this issue and what you expect as assistance from these forums. I'm finding it hard to help you because you've not given much info into your problem and you're also a bit dismissive. It would be easier to help you if you were more open with your issues and less demanding for answers when you haven't provided much to begin with.
 
Old 05-12-2009, 05:01 PM   #7
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I agree that the first thing to check is proper build and config, the latter should be easy to check using "--verify-config". I ran honeyd+honeycomb out of DHCP with a MAC I temporarily repurposed. Apart from the honeypot being reachable Arpwatch will throw some MAC address and ARP flip flopping warnings which serves as check as well. Throwing some minor nmap fun against it does result in sigs being logged but to what extent they're useful prolly is an eye of the beholder thing:
Code:
alert tcp 240.0.0.0/8 0 -> any 0,7946,13834,14858,32522 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,13834,17930,32522 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FS+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,14858,40202 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,9226,14090,14858 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FS+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,9226,14858 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FS2+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,9226,9482,12298,12554,13834,14090,14602,14858,15626,17930,23050,29194,32522,40202,40458 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; fl
ags: FSA2+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,7946,9482,13834,14090,14858,15626,40202 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FS+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,9226,9482 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA2; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,9226 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA2+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0,9482,12298,14858,40458 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA2+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FS2+; ack: 1746178570; flow: stateless; )    
alert tcp 240.0.0.0/8 0 -> any 0 (msg: "Honeycomb Day Month HourhMinutesmSecs Year "; ip_proto: "20"; fragbits: R; flags: FSA2+; ack: 1746178570; flow: stateless; )
 
Old 05-12-2009, 05:31 PM   #8
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Sweet!! Awesome stuff! This should work for the OP also, then.
 
Old 05-12-2009, 05:39 PM   #9
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Definately should. If it doesn't he should, like you already told him, be way more verbose and post his config, commandline, logs et cetera.
 
Old 05-19-2009, 04:02 AM   #10
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Original Poster
Rep: Reputation: 15
I've also tried to probe my honeycomb host with nmap , and it returns with the signs similar to unSpawn's . And what I am trying to do now is to generate snort signature of rpc-dcom exploit (http://packetstormsecurity.org/0307-exploits/dcom.c).
Here's my honeyd + honeycomb configuration :

http://silenceisdefeat.com/~l41n/ta/honeycomb.conf

And here's the result of the honeycomb.log after I executed dcom exploit to the simulated honeypot host :

http://silenceisdefeat.com/~l41n/ta/honeycomb.log

And it didn't generate any signatures. I'm still looking for the way how can I generate this rpc-dcom exploit signatures. I'm sorry for still bothering you guys..

Thank you
 
Old 05-19-2009, 05:40 PM   #11
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
I don't know what you want me to do? You could run the exploit against a mcrsft host and capture the packets, then run them through Snort (with the right ruleset) and see if it picks it up (should, as its a known '03 exploit), run it against your honeypot and capture, then compare packets with the mcrsft one. If there's a difference there's something wrong, if not I might run it myself and see if I can elicit a more favourable response.
 
Old 05-19-2009, 06:38 PM   #12
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Original Poster
Rep: Reputation: 15
I just want to know How can I generate rpcdcom exploit snort signatures by using honeycomb ?
coz' this is all i got when I run the rpcdcom exploit against the honeypot :

Quote:
# Signature report at Tue May 19 03:06:56 2009
alert tcp any 0 -> any 0 (msg: "Honeycomb Tue May 19 03h06m46 2009 "; ip_proto: "ip"; flags: F+; flow: stateless; )
alert tcp any 0 -> any 0 (msg: "Honeycomb Tue May 19 03h06m46 2009 "; ip_proto: "ip"; flags: FPA1; flow: stateless;
 
Old 05-19-2009, 07:31 PM   #13
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
OK, so what would you want to invest yourself figuring it out?

Last edited by unSpawn; 05-19-2009 at 07:34 PM. Reason: much better
 
Old 05-20-2009, 01:33 AM   #14
summersgone
LQ Newbie
 
Registered: Dec 2006
Posts: 29

Original Poster
Rep: Reputation: 15
anything dude.
 
Old 05-20-2009, 03:21 AM   #15
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
It's appreciated you posted your conf and log but that act itself doesn't constitute troubleshooting. When something goes wrong or doesn't work as advertised you want to start analysing. Bonus points for having an actual environment to baseline it against, else move on to the Next Best Thing (if you don't want to root your mcrsft box or had it patched). Let me know if you disagree with the packet capture approach.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Sun releases Honeycomb under BSD licence LXer Syndicated Linux News 0 04-19-2008 12:12 AM
Incorrect double click on occasion when using a USB mouse arobinson74 Linux - Hardware 1 02-02-2006 11:55 PM
On occasion my screen goes black??? darkone66669 Linux - Hardware 9 04-26-2004 06:57 PM
System hangs on occasion, especially downloading stuff TravisOSF Mandriva 5 04-03-2004 04:13 PM
Snort, P2P, devise signatures RobK Linux - Security 1 01-15-2004 12:26 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:47 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration